According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]
Following the clamorous Hacking Team hack the company asked all its customers to shut down all the operations and don’t use its solutions in this phase. Hacking Team has been hacked and its social media account hijacked, the news is shocking the IT security industry because privacy advocated have always accused the company to sell […]
Hacking Team, the Italian surveillance firm that develops spyware and hacking software has been hacked by attackers that exfiltrated some 400Gbs of data. The Italian security firm Hacking Team has allegedly been hacked, unknown attackers have exfiltrated some 400Gbs of data. The company has often been at the center of heated debate because of surveillance […]
Anonymous India hacked the BSNL Telecommunications Journal website and claims to have compromised more than 30 million records. The website of the BSNL Telecommunications Journal has been hacked by the hacktivists of the Indian Anonymous arm named AnonOpsIndia. Anonymous India the BSNL journal website to protest against the surveillance programs operated by the Indian Government. […]
ProxyHam is a hardware device designed by a group of researchers to allow anonymous connections to Wi-Fi from about 2.5 Miles away. Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience, an amazing system for the anonymity of whistleblowers, journalists and dissidents. Caudill named his device ProxyHam, it’s a “hardware […]
Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]
Facebook developed an astonishing algorithm for facial recognition considered as the latest Artificial Intelligence step, it’s name is PIPER. Artificial Intelligence has been playing an important role to offer better and outstanding features in applications and a lot of computer giants and agencies have spent huge amount of money to acquire more and more. Facebook […]
The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what does it means for Americans? The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, where the NSA is able to spy internet traffic in search […]
“Torus” a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes alliance. The researcher Duncan Campbell analyzed a document leaked by the NSA whistleblower Edward Snowden focusing his investigation on the a term used in the secret slides that could have revealed a massive increase in the […]